That enought.
For solve a crackme we need to know 'n' and 'e'
Because those data are not public and used for crypt the text you have entered in the binnary.
But here... we dont want crypt !
so we need 'd'
With 'n' and 'e' we found 'p' and 'q' by factorising 'n' and then.. calculate 'd'
you can do this with RSA-Tool 2 by tE!
So we have 4F90128A8D65DD7C7919EDEFCCD4EEB5... :)

Want the source code ? sure.
I've used 2 lib who are not with the masm32 sdk10...:
biglib v. 0.01e by roy|fleur, and the mfmplayer library.
You can download the package here (The pirate crackme is also inside)

BEGIN
CONTROL "Exit",IDB_EXIT,"Button",0x10010000,217,126,45,13,0x00000000
CONTROL "Zenk-Security",IDC_NAME,"Edit",0x50010000,27,89,234,13,0x00000200
CONTROL "Name",IDC_STATIC1003,"Static",0x50000000,3,89,20,8,0x00000000
CONTROL "Serial",IDC_STATIC1004,"Static",0x50000000,4,108,20,9,0x00000000
CONTROL "",IDC_SERIAL,"Edit",0x50010000,27,108,234,12,0x00000200
CONTROL "GEN",IDB_GENERATE,"Button",0x10010000,167,126,44,13,0x00000000
CONTROL "#946",IDC_IMAGE1008,"Static",0x5080020e,3,3,257,81,0x00000000
CONTROL "27/10/2010",IDC_STATIC1009,"Static",0x58000000,3,132,81,7,0x00000000END